Just like detectives look into the mind of a criminal to solve the case, you can look into the mind of a hacker to guard your company’s online data. Hackers adapts quickly to new environments and enjoys a challenge. What are insights to be gleaned from their endeavors.?
While many people are struck with fear, they also seem paralyzed as they look for what they can do about online threats, cyber crime and control over their data privacy.
Recent DEFCON Voting Village report showed that some of the most popular and widely used voting machines vulnerable to hacking and that their security in the upcoming election is anything but assured.
The international community is under no illusion regarding the persistent threat that is posed by Russian hackers as the U.S. Department of Justice indicts 7 Russian GRU members, and other nations including the U.K. and the Netherlands protest hacking activities.
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos.
As might be expected, the scale and scope of the latest Coinrail cyber heist has increased the call for new cryptocurrency regulations for both exchanges and trading, and could go a long way in maintaining investor faith in the modern financial system.
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.
The U.S. Federal Government is a behemoth that touches every aspect of American life – and today the services and information needed by U.S. citizens are increasingly found online. However, the latest report on the state of U.S. federal websites indicates that they fail on some key indicators regarding web security.
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.